Building a zero trust environment

1 June 2019 Infrastructure, Integrated Solutions

New technologies and trends, including the mobile workforce, BYOD, IoT, digital transformation, and the consumerisation of IT, are shifting identity and access management to the very core of digital organisations – the IT environment is becoming increasingly distributed.

So says Adeshni Rohit, business unit manager for Cisco at Axiz, adding that as the IT environment becomes more distributed, all these technologies, while delivering significant benefits and value, are ultimately widening the attack surface and greatly increasing enterprise risk. “What is crucial is that the way we secure today’s businesses under the digital age has changed. Perimeter security, which acts as layers around our valuable assets, is ineffective. We are trying to protect our data, and need to start building that protection around our IP and other information assets.”

Moreover, she says today’s data centres are becoming fragmented, no longer constrained by the comfortable security perimeter of firewalls and VPNs we so carefully constructed over the last decade. “Protecting today’s cloud-based, mobile enterprise requires a whole new approach. Although it is impossible to control the whole security stack for every cloud application, it is possible to employ tools and new identity standards to fill the gaps left by the disappearance of the traditional perimeter as we once knew it.”

IAM (identity and access management) that was once about defining and managing the roles and access privileges of individual users across the company, and under which circumstances in which users are granted or denied access privileges, has changed, explains Rohit. “It now goes far beyond a tool used to manage user identities and access, is it used to uniquely profile users, track their needs and behaviours, and drive security and efficiency.”

Traditional security architectures were designed with two groups in mind, trusted individuals, who need to be able to access everything inside the business, and untrusted ones, who are kept at arm’s length. There was a time, she says, when the tech department threw money at the latest and greatest defensive tools that formed a barrier between the two types of users, and emphasised securing the network perimeter, usually with firewalls. And this worked for a while, the barrier kept potential threats at bay and attackers out. But it also caused problems, because should the barrier fail, or a bad actor find a chink in its armour and gain a foothold on the company network, they would effectively have carte blanche over anything and everything on the organisations systems.

According to Rohit, another problem was the increased adoption of mobile and cloud technologies, that sees more work being conducted outside the safety of the company network. “This effectively breaks down the barrier between the two types of user, and the network perimeter becomes increasingly difficult to enforce. Employees, contractors, partners and suppliers, all access company data from beyond the traditional perimeter. In today’s cloud and mobile world, more individuals access more and more resources and data from a wide range of devices. And it only takes one attacker to wreak havoc within the company network, which means that businesses can no longer assume trust across any part of the IT environment, which throws away the idea of a trusted internal network and versus an untrusted external network.”

Identity is the common denominator, she adds, and the new security perimeter. “It is the only hope of securely connecting a vast ecosystem of users, devices and locations. And this is where zero trust comes in. Zero Trust is a security framework, developed by Forrester Research analyst Jon Kindervag in 2009. With zero trust, organisations cannot automatically trust anything inside or outside their perimeters. They need to verify anything and everything that is trying to connect to its systems, before it grants any access at all.”

Zero trust security rids security teams of the notion that organisations should have a ‘trusted’ internal network and an ‘untrusted’ external network. Technologies such as IoT, mobile and cloud mean that a network perimeter-centric view of security no longer works. What is needed now, is the ability to securely enable access for all users, including staff, third-party partners, contractors, suppliers and suchlike, irrespective of where they are located, or which device and network they are using.

In this way, a zero trust model makes sense. “In today’s security landscape, it’s not about the network any more, it’s about the people who access your systems, and the access controls for those people. This is where identity comes in, and making identity the foundation of zero trust. ‘Never trust, always verify’, is the key principle here. In this way, on the right people have the right level of access, to the right resources, in the right context, at the right time. And all this access is assessed on an ongoing basis, without impacting on the user at all,” says Rohit.

However, she says choosing the right IAM solution is critical. “Beginning a zero trust journey by employing a mixture of on-premises and cloud applications that are not well integrated, means the IT department will be burdened with the task of managing disparate identities across a number of systems. The user is encumbered with having to remember multiple, and therefore most likely weak passwords, and a lack of visibility and ownership over these fragmented identities leaves IT and security teams with massive gaps for threat actors to slither through.

This is why Axiz builds ecosystems to help its partners with their identity and access management needs, explains Rohit. “We help our customers to choose solutions that can scale to meet the needs of any business, from the smaller SMEs to today’s largest corporates, using thousands of integrations, cloud and on-premise, to securely connect everything, giving organisations the ability to easily manage single sign-on, provision users, and synchronise data across apps and systems.”

For more information, contact Axiz, +27 11 237 7000, [email protected], www.axiz.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Data resilience at VeeamON
Technews Publishing SMART Security Solutions Infrastructure Information Security
SMART Security Solutions attended the VeeamON Tour in Johannesburg in August to learn more about data resilience and Veeam’s initiatives to enhance data protection, both on-site and in the cloud.

Read more...
Make BIG and COMPLEX small and manageable
neaMetrics Suprema AI & Data Analytics Surveillance Integrated Solutions
Traditional CCTV and access systems often operate separately, creating gaps in visibility and efficiency. TRASSIR and Suprema have partnered to develop an integrated platform that improves security, operations, and situational awareness.

Read more...
Troye exposes the Entra ID backup blind spot
Information Security Infrastructure
If you trust Microsoft to protect your identity, think again. Many organisations naively believe that Microsoft’s shared responsibility model covers Microsoft Entra?ID – formerly Azure AD – but it does not.

Read more...
Secure data protection without hardware lock-in
Infrastructure Information Security News & Events
New Veeam Software Appliance empowers IT teams to achieve instant protection with Veeam’s fully preconfigured, software-only appliance, delivering enterprise-ready simplified deployment and operational efficiency, robust cyber resilience.

Read more...
Hytera supports communication upgrade for Joburg
News & Events Infrastructure Government and Parastatal (Industry)
By equipping Johannesburg’s metro police and emergency services with multimode radios which integrate TETRA and LTE networks, Hytera is bridging coverage gaps and improving response times across the city.

Read more...
Combining TETRA or DMR with 5G broadband
Infrastructure IoT & Automation
As enterprises face rising complexity and connectivity demands, hybrid networks offer a transformative path, combining the proven reliability of TETRA or DMR with the innovation and coverage of 5G broadband.

Read more...
Questing for the quantum AI advantage
Infrastructure AI & Data Analytics
The clock is ticking down to the realisation of quantum AI and the sought-after ‘quantum advantage’. In many boardrooms, however, quantum remains mysterious; full of promise, but not fully understood.

Read more...
The growing role of hybrid backup
Infrastructure Information Security
As Africa’s digital economy rapidly grows, businesses across the continent are facing the challenge of securing data in an environment characterised by evolving cyberthreats, unreliable connectivity and diverse regulatory frameworks.

Read more...
IoT-driven smart data to stay ahead
IoT & Automation Infrastructure AI & Data Analytics
In a world where uncertainty is constant, the real competitive edge lies in foresight. Businesses that turn real-time data into proactive strategies will not just survive, they will lead.

Read more...
Hydrogen is green but dangerous
Fire & Safety Infrastructure Power Management
Hydrogen infrastructure is developing quickly, but it comes with safety challenges. Hydrogen is flammable, and its small molecular size means it can leak easily. Additionally, fires caused by hydrogen are nearly invisible, making them difficult to detect and respond to.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.